Quote: |
This person has the resources to hire somebody to break WPA2 |
Quote: |
Does anybody here know how you'd manipulate that file to create the restore described above? |
Quote: |
I'm open to suggestions as to how to secure the network and what steps to take forensincally to try to identify how this happened. |
matt_s wrote: | ||
Bob,
A few of my thoughts.
|
Quote: |
Why use a tool to do that when everything you describe in your post smells more like a Trojan horse. |
Quote: |
Attacking your wireless is only half a job, someone would have to then hack your computer. An attacker is better placed to send you a link to an infected web page and infect your computer and take control of it. This would explain how no additional MAC addresses appear in your wireless router. |
Quote: |
Well, securing your network s cheaper than forensically investigating what has happened. To secure it you should format everything and rebuild everything with new passwords and a new configuration. To investigate what has happened you need to unplug everything, copy it without modifying it, then using some very expensive software and some skills that you probably don't have and a considerable amount of time which you also don't have. |
Quote: |
It was ten numbers, no alpha or punctuation. |
Quote: |
Using some of the new tools which utilize the GPU of high end graphics cards, this would apparently be very easy to do. |
Quote: |
As I noted, my wife's machine frequently would go off the network for no apparent reason. |
Quote: |
Who's to say this won't happen again after a reformat? |
Quote: |
I need to know more about exactly what happened. |
output generated using printer-friendly topic mod, All times are GMT + 2 Hours